The Good Tech Companies - SquareX Discloses Browser-Native Ransomware That Puts Millions At Risk
Episode Date: March 29, 2025This story was originally published on HackerNoon at: https://hackernoon.com/squarex-discloses-browser-native-ransomware-that-puts-millions-at-risk. Chainalysis estimate...s that corporations spend nearly $1 billion dollars on ransom each year, but the greater cost Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #squarex, #cybernewswire, #squarex-announcement, #cyber-threats, #cyber-security-awareness, #cybersecurity-tips, #good-company, and more. This story was written by: @cybernewswire. Learn more about this writer by checking @cybernewswire's about page, and for more stories, please visit hackernoon.com. Ransomware attacks typically involve tricking victims into downloading and installing the ransomware, which copies, encrypts, and/or deletes critical data on the device, only to be restored upon the ransom payment. SquareX has been disclosing major browser vulnerabilities like Polymorphic Extensions and Browser Syncjacking. The company is issuing a strong warning on the emergence of browser-native ransomware.
Transcript
Discussion (0)
This audio is presented by Hacker Noon, where anyone can learn anything about any technology.
Square X discloses browser-native ransomware that puts millions at risk.
By Cyber Newswire, Palo Alto, USA, March 28, 2025, Cyber Newswire, from Wanakry to the MGM
Resorts hack, ransomware remains one of the most damaging cyber threats to plague enterprises.
Chainelysis estimates that corporations spend nearly $1 billion dollars on ransom each year, but the greater
cost often comes from the reputational damage and operational disruption caused by the attack.
Ransomware attacks typically involve tricking victims into downloading and installing the
ransomware, which copies, encrypts, and or deletes critical data on the device, only
to be restored upon
the ransom payment.
Traditionally, the primary target of ransomware has been the victim's device.
However, thanks to the proliferation of the cloud and SaaS services, the device no longer
holds the keys to the kingdom.
Instead, the browser has become the primary way through which employees conduct work and
interact with the internet.
In other words, the browser is becoming the new endpoint.
Square X has been disclosing major browser vulnerabilities like polymorphic extensions
and browser syncjacking, and is now issuing a strong warning on the emergence of browser
native ransomware.
Greater than Square X's founder, Vivek Ramachandran cautions, with the recent surge in greater
than browser-based identity attacks like the one we saw with the Chrome Store OAuth greater-than-attack, we are beginning
to see evidence of the, ingredients, of greater-than-browser native ransomwares being used by adversaries.
It is only a matter of greater-than-time before one smart attacker figures out how to put
all the pieces together. Greater than while EDRs and antiviruses have played an unquestionably
vital role in
greater than defending against traditional ransomware, the future of ransomware will
no greater than longer involve file downloads, making a browser-native solution a necessity
to greater than combat browser-native ransomwares. Greater than greater than, unlike traditional
ransomware, browser-native ransomware requires no file download, rendering them completely
undetectable by endpoint security solutions.
Rather, this attack targets the victim's digital identity, taking advantage of the
widespread shift toward cloud-based enterprise storage and the fact that browser-based authentication
is the primary gateway to accessing these resources.
In the case studies demonstrated by Square X, these attacks leverage AI agents to automate the majority of the attack sequence, requiring minimal social engineering and interference from the attacker.
One potential scenario involves social engineering a user into granting a fake productivity tool access to their email, through which it can identify all the SAAS applications the victim is registered with. It can then systematically reset the password of these apps with AI agents, logging the users out on Theron
and holding enterprise data stored on these applications hostage. Similarly, the
attacker can also target file sharing services like Google Drive, Dropbox and
OneDrive, using the victim's identity to copy out and delete all files stored
under their account. Critically, attackers can also gain access to all shared drives, including those shared
by colleagues, customers and other third parties.
This significantly expands the attack surface of browser-native ransomware where the impact
of most traditional ransomware is confined to a single device.
All it takes is one employee's mistake for attackers to gain full access to enterprise-wide
resources.
As fewer and fewer files are being downloaded, it is inevitable for attackers to follow where
work and valuable data are being created and stored.
As browsers become the new endpoint, it is crucial for enterprises to reconsider their
browser security strategy.
Just as EDRs were critical to defend against file-based ransomware, a browser-native solution
with a deep understanding of client-side application layer identity attacks will become essential
in combating the next generation of ransomware attacks.
To learn more about this security research, users can visit https://sqrx.com, Browser-native
Ransomware about SquareX Square X's industry first browser detection
and response, BDR, solution helps organizations detect, mitigate, and threat hunt client-side
web attack-a-shopping against their users in real time.
In addition to browser ransomware, Square X also protects against various browser threats
including identity attacks, malicious extensions, advanced spearfishing, gen-AIDLP, and insider threats. The browser native ransomware disclosure is
part of the Year of Browser Bugs project. Every month, Square-X's research team
releases a major web attack that focuses on architectural limitations of the
browser and incumbent security solutions. Previously disclosed attacks
include browser syncjacking and polymorphic extensions.
To learn more about Square X's BDR, users can contact founder at sqrx.com, for press
inquiries on this disclosure or the year of browser bugs, users canemail Junus at sqrx.com,
contact head of PR Junus Liu Square Xjunis at sqrx.com.
Tip This story was distributed as a release by CyberNewsWire under Hacker Noon's business
blogging program.
Learn more about the program here.
Thank you for listening to this Hacker Noon story, read by Artificial Intelligence.
Visit hackernoon.com to read, write, learn and publish.